[Bug 728] New: ip_tables: limit match: invalid size 40!=48

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Wed Jul 13 03:43:35 CEST 2011


http://bugzilla.netfilter.org/show_bug.cgi?id=728

           Summary: ip_tables: limit match: invalid size 40!=48
           Product: netfilter/iptables
           Version: linux-2.6.x
          Platform: mips64
        OS/Version: Debian GNU/Linux
            Status: NEW
          Severity: critical
          Priority: P2
         Component: ip_tables (kernel)
        AssignedTo: netfilter-buglog at lists.netfilter.org
        ReportedBy: wensy1009 at sina.com
   Estimated Hours: 0.0


I cross compiled iptables for mips(64bit) architecture and tried running
iptables in pizzabox.my linux kernel is 2.6.32,first use iptables 1.4.4,after
that i try iptables 1.4.11, problem still be there.when i set first entry which
has limit match,the value off=8(xt_compat_match_offset(match)) in function
xt_compat_match_from_user. After that ,i input another rule,it tells me
"iptables: Invalid argument". dmesg tell me "ip_tables: limit match: invalid
size 40!=48 "
i open the DEBUG_IP_FIREWALL_USER in ip_tables.c,and add some print
information.
can you tell me how to fix this bug? 


==================
print information:
$./iptables -A INPUT -p icmp -m limit --limit  6/m --limit-burst 7 -j ACCEPT
===print infromation:
t->private->number = 7
fun_into_compat_do_ipt_set_ctl
compat_do_replace_copy_from_user
copy from user:name filter,valid_hooks 14,number entries8,size
1480,hood_entry[5]:00100011520,underflow[5]:0848100011520,num_counters:7,counters:268608936,..
tmp.size:1480
fun_translate_compat_table
translate_compat_table: size 1480
check_compat_entry_size_and_hooks a8000000019e8000
check_compat_entry_size_and_hooks a8000000019e80e8
check_compat_entry_size_and_hooks a8000000019e81b0
check_compat_entry_size_and_hooks a8000000019e8278
check_compat_entry_size_and_hooks a8000000019e8350
check_compat_entry_size_and_hooks a8000000019e83e8
check_compat_entry_size_and_hooks a8000000019e8480
check_compat_entry_size_and_hooks a8000000019e8518
Finished chain 1
Finished chain 2
Finished chain 3
xt_table_newinfo:size1488,number8,initial_entries0,hookentry[5]:00100811600,underflow[5]:0856100811600..
newinfo->size:1488,i:8,ret:0
ret:0,tmp.valid_hooks:14,tmp.size:1480,tmp.num_entries:8compat_do_replace:
Translated table
do_replace: oldnum=7, initnum=4, newnum=8

$./iptables -N syn_flood  
=========than print Ivalid arguments
t->private->number = 8
fun_into_compat_do_ipt_set_ctl
compat_do_replace_copy_from_user
copy from user:name filter,valid_hooks 14,number entries10,size
1816,hood_entry[5]:00100811600,underflow[5]:0856100811600,num_counters:8,counters:268608600,..
tmp.size:1816
fun_translate_compat_table
translate_compat_table: size 1816
check_compat_entry_size_and_hooks a8000000019e8800
check_compat_entry_size_and_hooks a8000000019e88e8
check_compat_entry_size_and_hooks a8000000019e89b0
check_compat_entry_size_and_hooks a8000000019e8a78
check_compat_entry_size_and_hooks a8000000019e8b58
check_compat_entry_size_and_hooks a8000000019e8bf0
check_compat_entry_size_and_hooks a8000000019e8c88
check_compat_entry_size_and_hooks a8000000019e8d20
check_compat_entry_size_and_hooks a8000000019e8dd0
check_compat_entry_size_and_hooks a8000000019e8e68
Finished chain 1
Finished chain 2
Finished chain 3
ip_tables: limit match: invalid size 40 != 48
ip_tables: check failed for `par.match->name'.
xt_table_newinfo:size1824,number10,initial_entries0,hookentry[5]:00101611680,underflow[5]:0864101611680..
newinfo->size:1824,i:3,ret:-22
ret:-22,tmp.valid_hooks:14,tmp.size:1816,tmp.num_entries:10
compat_do_replace
compat_do_ipt_set_ctl_end,ret:-22


-- 
Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
You are watching all bug changes.



More information about the netfilter-buglog mailing list